Crypto chip system for resisting physical invasion and side-channel attack and implementation method thereof
A side-channel attack and cryptographic chip technology, which is applied in the field of cryptographic chip systems against physical intrusion and side-channel attacks, can solve problems such as unsuitable public key cryptography, cryptographic chip security measures that are difficult to meet computing security, and do not provide security.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0094] Example
[0095] The cryptographic chip system for resisting physical intrusion and bypass attack of this embodiment, such as figure 1 As shown, including the dynamic key management module DKMM that limits the number of uses of each key and performs key update management, it also includes
[0096] DKMM non-volatile memory module dedicated to save auxiliary information required by DKMM;
[0097] Evaluate the SCA security of DKMM to set the maximum allowable number of uses of its key, and to prevent tampering and replay of DKMM's non-volatile memory content.
[0098] The DKMM includes a physical unclonable key module KPUF, a symmetric cryptographic algorithm execution engine, a public key cryptographic algorithm execution engine, a HASH execution engine, a random number generation module, a symmetric key use count register set, a private key use count register set, The cryptographic engine controls the state machine, and the sensitive circuit of the KPUF is arranged on the periph...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap